Hacker News
- Introduction to GPU Password Cracking: Owning the LinkedIn Password Dump https://www.trustedsec.com/june-2016/introduction-gpu-password-cracking-owning-linkedin-password-dump/ 74 comments
- A Brief History of Password Storage, Transmission, and Cracking https://www.trustedsec.com/may-2015/passwordstorage/ 4 comments
- Shellshock DHCP Remote Code Execution – Proof of Concept https://www.trustedsec.com/september-2014/shellshock-dhcp-rce-proof-concept/ 155 comments
Lobsters
- OSX Local Root Privilege Escalation Exploit https://www.trustedsec.com/august-2013/osx-10-8-4-local-root-privilege-escalation-exploit/ 2 comments mac , security
- New Tool: Orpheus - Bypasses most Kerberoast Detections https://www.trustedsec.com/blog/the-art-of-bypassing-kerberoast-detections-with-orpheus/ 10 comments netsec
- The Curious Case of ManageEngine’s Password Manager Pro's Password Database https://www.trustedsec.com/blog/the-curious-case-of-the-password-database/ 19 comments netsec
- Diving into Pre-Created computer accounts in Active Directory https://www.trustedsec.com/blog/diving-into-pre-created-computer-accounts/ 4 comments netsec
- NTLM Relaying - A comprehensive guide https://www.trustedsec.com/blog/a-comprehensive-guide-on-relaying-anno-2022/?hss_channel=tw-403811306 13 comments netsec
- Cracking Randomly Generated Passwords https://www.trustedsec.com/blog/recovering-randomly-generated-passwords/ 8 comments netsec
- COFFLoader: Building your own in memory loader or how to run BOFs https://www.trustedsec.com/blog/coffloader-building-your-own-in-memory-loader-or-how-to-run-bofs/ 2 comments netsec
- Injecting Rogue DNS Records Using DHCP https://www.trustedsec.com/blog/injecting-rogue-dns-records-using-dhcp/ 3 comments netsec
- 4 Free Easy Wins That Make Red Teams Harder https://www.trustedsec.com/blog/4-free-easy-wins-that-make-red-teams-harder/ 13 comments netsec
- New persistence technique using Windows Telemetry https://www.trustedsec.com/blog/abusing-windows-telemetry-for-persistence/ 6 comments netsec
- A look at Breaking some Typical Windows Hardening Implementations https://www.trustedsec.com/blog/breaking-typical-windows-hardening-implementations/ 3 comments netsec
- How to find Command line parameters in Windows https://www.trustedsec.com/blog/wanted-process-command-lines 6 comments netsec
- Citrix ADC / NetScaler pre auth RCE in the wild (CVE-2019-19781) https://www.trustedsec.com/blog/critical-exposure-in-citrix-adc-netscaler-unauthenticated-remote-code-execution/ 3 comments sysadmin
- Bringing "new" life into some old hacks on the lock screen https://www.trustedsec.com/blog/playing-with-old-hacks/ 8 comments netsec
- Finding the AV signature for Regsvr32.exe and techniques for bypassing it https://www.trustedsec.com/blog/discovering-the-anti-virus-signature-and-bypassing-it/ 6 comments netsec
- Next Gen Phishing – Leveraging Azure Information Protection https://www.trustedsec.com/2019/04/next-gen-phishing-leveraging-azure-information-protection/ 9 comments netsec
- CORS Findings: Another Way to Comprehend https://www.trustedsec.com/2018/04/cors-findings/ 7 comments netsec
- Introduction to GPU Password Cracking: Owning the LinkedIn Password Dump https://www.trustedsec.com/june-2016/introduction-gpu-password-cracking-owning-linkedin-password-dump/ 95 comments netsec
- SHIPS – Centralized Password Management for Linux & Windows. https://www.trustedsec.com/january-2015/introducing-ships-centralized-local-password-management-windows/ 3 comments sysadmin
- Introducing TAP - An Open-Source Attack Platform https://www.trustedsec.com/october-2015/introducing-tap-an-open-source-attack-platform/ 3 comments netsec
- We Don't Need No Stinkin' PSExec - TrustedSec https://www.trustedsec.com/june-2015/no_psexec_needed/ 3 comments netsec
- The PenTesters Framework (PTF) Released https://www.trustedsec.com/may-2015/new-tool-the-pentesters-framework-ptf-released/ 18 comments netsec
- BSIDESLV Secret Pentesting Techniques http://www.trustedsec.com/files/bsideslv_secret_pentesting_techniques.pdf 4 comments netsec
- From MS14-068 to Full Compromise https://www.trustedsec.com/december-2014/ms14-068-full-compromise-step-step/ 13 comments netsec
- MeterSSH – Meterpreter over SSH https://www.trustedsec.com/november-2014/meterssh-meterpreter-ssh/ 8 comments netsec
- DHCP Remote Code Execution PoC from CVE-2014-6271 https://www.trustedsec.com/september-2014/shellshock-dhcp-rce-proof-concept/ 3 comments netsec
- Large CHS Medical hack was result of Heartbleed vulnerability in Juniper VPN device https://www.trustedsec.com/august-2014/chs-hacked-heartbleed-exclusive-trustedsec/ 40 comments netsec